Usable Security: What Is It? How Do We Get It?
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Book |
Published: |
2005
|
_version_ | 1826279805397499904 |
---|---|
author | Sasse, M Flechais, I |
author2 | Cranor, L |
author_facet | Cranor, L Sasse, M Flechais, I |
author_sort | Sasse, M |
collection | OXFORD |
description | |
first_indexed | 2024-03-07T00:04:17Z |
format | Book |
id | oxford-uuid:77002ad4-ac40-479d-8818-05f4884d8d99 |
institution | University of Oxford |
last_indexed | 2024-03-07T00:04:17Z |
publishDate | 2005 |
record_format | dspace |
spelling | oxford-uuid:77002ad4-ac40-479d-8818-05f4884d8d992022-03-26T20:20:20ZUsable Security: What Is It? How Do We Get It?Bookhttp://purl.org/coar/resource_type/c_2f33uuid:77002ad4-ac40-479d-8818-05f4884d8d99Department of Computer Science2005Sasse, MFlechais, ICranor, LGarfinkel, S |
spellingShingle | Sasse, M Flechais, I Usable Security: What Is It? How Do We Get It? |
title | Usable Security: What Is It? How Do We Get It? |
title_full | Usable Security: What Is It? How Do We Get It? |
title_fullStr | Usable Security: What Is It? How Do We Get It? |
title_full_unstemmed | Usable Security: What Is It? How Do We Get It? |
title_short | Usable Security: What Is It? How Do We Get It? |
title_sort | usable security what is it how do we get it |
work_keys_str_mv | AT sassem usablesecuritywhatisithowdowegetit AT flechaisi usablesecuritywhatisithowdowegetit |